[Pkg-shadow-devel] The way UIDs and GIDs are created

Martin Bammer mrbm74 at gmail.com
Sat Sep 24 10:58:35 UTC 2016

Also there's now the concept of subuids and subgids which can leave a quite
> small set of usable uids and which, moreover, would become unusable after
> the first few random uids, as the subuids need to (each) be a consecutive
> range.

Didn't know about this conecpt. And honestly I do not understand the purpose of
this concept. But as I understand this concept is optional and must be
configured manually to be activated.
The concept of hash values for UIDs and GIDs should also be optional. It only
makes sense in unmanaged networks.
The implementation I would suggest is as follows:
- Activating hash values is done either via a parameter or via an entry in a
config file in /etc.
- The entry in the config file is initially set by the installer. In the
installer the user can choose if he wants to activate this. So that the first
user created in the newly installed system already has hash values for UIDs and
GIDs generated.
- UIDs and GIDs used for new users and new groups can always be overridden by a


More information about the Pkg-shadow-devel mailing list